Viewing file: cms-examples.pl (8.69 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
#! /usr/bin/env perl # Copyright 2008-2016 The OpenSSL Project Authors. All Rights Reserved. # # Licensed under the Apache License 2.0 (the "License"). You may not use # this file except in compliance with the License. You can obtain a copy # in the file LICENSE in the source distribution or at # https://www.openssl.org/source/license.html
# Perl script to run tests against S/MIME examples in RFC4134 # Assumes RFC is in current directory and called "rfc4134.txt"
use MIME::Base64;
my $badttest = 0; my $verbose = 1;
my $cmscmd; my $exdir = "./"; my $exfile = "./rfc4134.txt";
if (-f "../apps/openssl") { $cmscmd = "../util/shlib_wrap.sh ../apps/openssl cms"; } elsif (-f "..\\out32dll\\openssl.exe") { $cmscmd = "..\\out32dll\\openssl.exe cms"; } elsif (-f "..\\out32\\openssl.exe") { $cmscmd = "..\\out32\\openssl.exe cms"; }
my @test_list = ( [ "3.1.bin" => "dataout" ], [ "3.2.bin" => "encode, dataout" ], [ "4.1.bin" => "encode, verifyder, cont, dss" ], [ "4.2.bin" => "encode, verifyder, cont, rsa" ], [ "4.3.bin" => "encode, verifyder, cont_extern, dss" ], [ "4.4.bin" => "encode, verifyder, cont, dss" ], [ "4.5.bin" => "verifyder, cont, rsa" ], [ "4.6.bin" => "encode, verifyder, cont, dss" ], [ "4.7.bin" => "encode, verifyder, cont, dss" ], [ "4.8.eml" => "verifymime, dss" ], [ "4.9.eml" => "verifymime, dss" ], [ "4.10.bin" => "encode, verifyder, cont, dss" ], [ "4.11.bin" => "encode, certsout" ], [ "5.1.bin" => "encode, envelopeder, cont" ], [ "5.2.bin" => "encode, envelopeder, cont" ], [ "5.3.eml" => "envelopemime, cont" ], [ "6.0.bin" => "encode, digest, cont" ], [ "7.1.bin" => "encode, encrypted, cont" ], [ "7.2.bin" => "encode, encrypted, cont" ] );
# Extract examples from RFC4134 text. # Base64 decode all examples, certificates and # private keys are converted to PEM format.
my ( $filename, $data );
my @cleanup = ( "cms.out", "cms.err", "tmp.der", "tmp.txt" );
$data = "";
open( IN, $exfile ) || die "Can't Open RFC examples file $exfile";
while (<IN>) { next unless (/^\|/); s/^\|//; next if (/^\*/); if (/^>(.*)$/) { $filename = $1; next; } if (/^</) { $filename = "$exdir/$filename"; if ( $filename =~ /\.bin$/ || $filename =~ /\.eml$/ ) { $data = decode_base64($data); open OUT, ">$filename"; binmode OUT; print OUT $data; close OUT; push @cleanup, $filename; } elsif ( $filename =~ /\.cer$/ ) { write_pem( $filename, "CERTIFICATE", $data ); } elsif ( $filename =~ /\.pri$/ ) { write_pem( $filename, "PRIVATE KEY", $data ); } $data = ""; $filename = ""; } else { $data .= $_; }
}
my $secretkey = "73:7c:79:1f:25:ea:d0:e0:46:29:25:43:52:f7:dc:62:91:e5:cb:26:91:7a:da:32";
foreach (@test_list) { my ( $file, $tlist ) = @$_; print "Example file $file:\n"; if ( $tlist =~ /encode/ ) { run_reencode_test( $exdir, $file ); } if ( $tlist =~ /certsout/ ) { run_certsout_test( $exdir, $file ); } if ( $tlist =~ /dataout/ ) { run_dataout_test( $exdir, $file ); } if ( $tlist =~ /verify/ ) { run_verify_test( $exdir, $tlist, $file ); } if ( $tlist =~ /digest/ ) { run_digest_test( $exdir, $tlist, $file ); } if ( $tlist =~ /encrypted/ ) { run_encrypted_test( $exdir, $tlist, $file, $secretkey ); } if ( $tlist =~ /envelope/ ) { run_envelope_test( $exdir, $tlist, $file ); }
}
foreach (@cleanup) { unlink $_; }
if ($badtest) { print "\n$badtest TESTS FAILED!!\n"; } else { print "\n***All tests successful***\n"; }
sub write_pem { my ( $filename, $str, $data ) = @_;
$filename =~ s/\.[^.]*$/.pem/;
push @cleanup, $filename;
open OUT, ">$filename";
print OUT "-----BEGIN $str-----\n"; print OUT $data; print OUT "-----END $str-----\n";
close OUT; }
sub run_reencode_test { my ( $cmsdir, $tfile ) = @_; unlink "tmp.der";
system( "$cmscmd -cmsout -inform DER -outform DER" . " -in $cmsdir/$tfile -out tmp.der" );
if ($?) { print "\tReencode command FAILED!!\n"; $badtest++; } elsif ( !cmp_files( "$cmsdir/$tfile", "tmp.der" ) ) { print "\tReencode FAILED!!\n"; $badtest++; } else { print "\tReencode passed\n" if $verbose; } }
sub run_certsout_test { my ( $cmsdir, $tfile ) = @_; unlink "tmp.der"; unlink "tmp.pem";
system( "$cmscmd -cmsout -inform DER -certsout tmp.pem" . " -in $cmsdir/$tfile -out tmp.der" );
if ($?) { print "\tCertificate output command FAILED!!\n"; $badtest++; } else { print "\tCertificate output passed\n" if $verbose; } }
sub run_dataout_test { my ( $cmsdir, $tfile ) = @_; unlink "tmp.txt";
system( "$cmscmd -data_out -inform DER" . " -in $cmsdir/$tfile -out tmp.txt" );
if ($?) { print "\tDataout command FAILED!!\n"; $badtest++; } elsif ( !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) ) { print "\tDataout compare FAILED!!\n"; $badtest++; } else { print "\tDataout passed\n" if $verbose; } }
sub run_verify_test { my ( $cmsdir, $tlist, $tfile ) = @_; unlink "tmp.txt";
$form = "DER" if $tlist =~ /verifyder/; $form = "SMIME" if $tlist =~ /verifymime/; $cafile = "$cmsdir/CarlDSSSelf.pem" if $tlist =~ /dss/; $cafile = "$cmsdir/CarlRSASelf.pem" if $tlist =~ /rsa/;
$cmd = "$cmscmd -verify -inform $form" . " -CAfile $cafile" . " -in $cmsdir/$tfile -out tmp.txt";
$cmd .= " -content $cmsdir/ExContent.bin" if $tlist =~ /cont_extern/;
system("$cmd 2>cms.err 1>cms.out");
if ($?) { print "\tVerify command FAILED!!\n"; $badtest++; } elsif ( $tlist =~ /cont/ && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) ) { print "\tVerify content compare FAILED!!\n"; $badtest++; } else { print "\tVerify passed\n" if $verbose; } }
sub run_envelope_test { my ( $cmsdir, $tlist, $tfile ) = @_; unlink "tmp.txt";
$form = "DER" if $tlist =~ /envelopeder/; $form = "SMIME" if $tlist =~ /envelopemime/;
$cmd = "$cmscmd -decrypt -inform $form" . " -recip $cmsdir/BobRSASignByCarl.pem" . " -inkey $cmsdir/BobPrivRSAEncrypt.pem" . " -in $cmsdir/$tfile -out tmp.txt";
system("$cmd 2>cms.err 1>cms.out");
if ($?) { print "\tDecrypt command FAILED!!\n"; $badtest++; } elsif ( $tlist =~ /cont/ && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) ) { print "\tDecrypt content compare FAILED!!\n"; $badtest++; } else { print "\tDecrypt passed\n" if $verbose; } }
sub run_digest_test { my ( $cmsdir, $tlist, $tfile ) = @_; unlink "tmp.txt";
my $cmd = "$cmscmd -digest_verify -inform DER" . " -in $cmsdir/$tfile -out tmp.txt";
system("$cmd 2>cms.err 1>cms.out");
if ($?) { print "\tDigest verify command FAILED!!\n"; $badtest++; } elsif ( $tlist =~ /cont/ && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) ) { print "\tDigest verify content compare FAILED!!\n"; $badtest++; } else { print "\tDigest verify passed\n" if $verbose; } }
sub run_encrypted_test { my ( $cmsdir, $tlist, $tfile, $key ) = @_; unlink "tmp.txt";
system( "$cmscmd -EncryptedData_decrypt -inform DER" . " -secretkey $key" . " -in $cmsdir/$tfile -out tmp.txt" );
if ($?) { print "\tEncrypted Data command FAILED!!\n"; $badtest++; } elsif ( $tlist =~ /cont/ && !cmp_files( "$cmsdir/ExContent.bin", "tmp.txt" ) ) { print "\tEncrypted Data content compare FAILED!!\n"; $badtest++; } else { print "\tEncryptedData verify passed\n" if $verbose; } }
sub cmp_files { my ( $f1, $f2 ) = @_; my ( $fp1, $fp2 );
my ( $rd1, $rd2 );
if ( !open( $fp1, "<$f1" ) ) { print STDERR "Can't Open file $f1\n"; return 0; }
if ( !open( $fp2, "<$f2" ) ) { print STDERR "Can't Open file $f2\n"; return 0; }
binmode $fp1; binmode $fp2;
my $ret = 0;
for ( ; ; ) { $n1 = sysread $fp1, $rd1, 4096; $n2 = sysread $fp2, $rd2, 4096; last if ( $n1 != $n2 ); last if ( $rd1 ne $rd2 );
if ( $n1 == 0 ) { $ret = 1; last; }
}
close $fp1; close $fp2;
return $ret;
}
|